================================================================== BUG: KASAN: stack-out-of-bounds in get_reg arch/x86/kernel/unwind_orc.c:391 [inline] BUG: KASAN: stack-out-of-bounds in unwind_next_frame+0x161c/0x1c60 arch/x86/kernel/unwind_orc.c:557 Read of size 8 at addr ffff8880ae607bf8 by task syz-executor304/32022 CPU: 0 PID: 32022 Comm: syz-executor304 Not tainted 4.19.144-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: __dump_stack lib/dump_stack.c:77 [inline] dump_stack+0x1fc/0x2fe lib/dump_stack.c:118 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256 kasan_report_error.cold+0x8a/0x1c7 mm/kasan/report.c:354 kasan_report mm/kasan/report.c:412 [inline] __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433 get_reg arch/x86/kernel/unwind_orc.c:391 [inline] unwind_next_frame+0x161c/0x1c60 arch/x86/kernel/unwind_orc.c:557 perf_callchain_kernel+0x3fa/0x5c0 arch/x86/events/core.c:2346 get_perf_callchain+0x392/0x860 kernel/events/callchain.c:202 perf_callchain+0x165/0x1c0 kernel/events/core.c:6448 perf_prepare_sample+0x81e/0x1620 kernel/events/core.c:6475 __perf_event_output kernel/events/core.c:6590 [inline] perf_event_output_forward+0xf3/0x270 kernel/events/core.c:6608 __perf_event_overflow+0x13c/0x370 kernel/events/core.c:7881 perf_swevent_overflow kernel/events/core.c:7957 [inline] perf_swevent_event+0x4b9/0x550 kernel/events/core.c:7995 perf_tp_event+0x29f/0xaa0 kernel/events/core.c:8413 perf_trace_run_bpf_submit+0x144/0x220 kernel/events/core.c:8387 perf_trace_lock_acquire+0x36b/0x530 include/trace/events/lock.h:13 trace_lock_acquire include/trace/events/lock.h:13 [inline] lock_acquire+0x298/0x3c0 kernel/locking/lockdep.c:3906 rcu_lock_acquire include/linux/rcupdate.h:242 [inline] rcu_read_lock include/linux/rcupdate.h:627 [inline] cpuacct_charge+0xa0/0x350 kernel/sched/cpuacct.c:347 cgroup_account_cputime include/linux/cgroup.h:767 [inline] update_curr+0x2ce/0x870 kernel/sched/fair.c:858 enqueue_entity+0xdba/0x3850 kernel/sched/fair.c:3955 enqueue_task_fair+0x12e/0x2270 kernel/sched/fair.c:5177 ttwu_activate kernel/sched/core.c:1639 [inline] ttwu_do_activate+0xce/0x1e0 kernel/sched/core.c:1698 ttwu_queue kernel/sched/core.c:1843 [inline] try_to_wake_up+0x700/0x1050 kernel/sched/core.c:2052 swake_up_locked kernel/sched/swait.c:30 [inline] swake_up_locked kernel/sched/swait.c:22 [inline] swake_up_one+0x71/0x1b0 kernel/sched/swait.c:40 flush_smp_call_function_queue+0x297/0x4d0 kernel/smp.c:247 smp_call_function_single_interrupt+0x98/0x440 arch/x86/kernel/smp.c:304 call_function_single_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:916 RIP: 0010:arch_local_irq_restore arch/x86/include/asm/paravirt.h:789 [inline] RIP: 0010:kmem_cache_free+0x11c/0x260 mm/slab.c:3766 Code: 11 48 63 75 74 48 89 df e8 d1 46 c1 01 e9 68 ff ff ff e8 07 44 cf ff 48 83 3d 07 bb 32 07 00 0f 84 f8 00 00 00 4c 89 e7 57 9d <0f> 1f 44 00 00 eb 86 65 8b 05 d6 e0 61 7e 83 f8 3f 0f 87 e7 00 00 RSP: 0018:ffff88809fe0f920 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff04 RAX: 0000000000000007 RBX: ffff88808d88c948 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000282 RBP: ffff88821bc33c40 R08: 0000000000400000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000282 R13: ffffffff81952682 R14: 000000000000104e R15: ffff888089f62240 remove_vma+0x132/0x170 mm/mmap.c:180 exit_mmap+0x359/0x530 mm/mmap.c:3102 __mmput kernel/fork.c:1015 [inline] mmput+0x14e/0x4a0 kernel/fork.c:1036 exit_mm kernel/exit.c:546 [inline] do_exit+0xab5/0x2b70 kernel/exit.c:874 do_group_exit+0x125/0x310 kernel/exit.c:990 get_signal+0x3f2/0x1f70 kernel/signal.c:2588 do_signal+0x8f/0x1670 arch/x86/kernel/signal.c:821 exit_to_usermode_loop+0x204/0x2a0 arch/x86/entry/common.c:163 prepare_exit_to_usermode arch/x86/entry/common.c:198 [inline] syscall_return_slowpath arch/x86/entry/common.c:271 [inline] do_syscall_64+0x538/0x620 arch/x86/entry/common.c:296 entry_SYSCALL_64_after_hwframe+0x49/0xbe RIP: 0033:0x446e29 Code: Bad RIP value. RSP: 002b:00007fcbca35adb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca RAX: fffffffffffffe00 RBX: 00000000006dcc28 RCX: 0000000000446e29 RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00000000006dcc28 RBP: 00000000006dcc20 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000246 R12: 00000000006dcc2c R13: 00007fff0ac9dc1f R14: 00007fcbca35b9c0 R15: 0000000000000000 The buggy address belongs to the page: page:ffffea0002b981c0 count:1 mapcount:0 mapping:0000000000000000 index:0x0 flags: 0xfffe0000000800(reserved) raw: 00fffe0000000800 ffffea0002b981c8 ffffea0002b981c8 0000000000000000 raw: 0000000000000000 0000000000000000 00000001ffffffff 0000000000000000 page dumped because: kasan: bad access detected Memory state around the buggy address: ffff8880ae607a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8880ae607b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 >ffff8880ae607b80: 00 00 00 00 00 f1 f1 f1 f1 f1 f1 04 f2 00 f3 f3 ^ ffff8880ae607c00: f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ffff8880ae607c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ==================================================================